Tag: security

Questions Related to security

  1. Authentication testing

  2. Session Management

  3. Information Gathering

  4. Authorization Testing


Correct Option: C
  1. Finding default files and directories

  2. Finding maximum attempts for account lockout

  3. Finding a password for a given user ID

  4. Finding the information displayed on a validation CAPTCHA


Correct Option: D

A security analyst tries to verify a blind SQL injection in an automated scanner results by manually inserting the SQL queries in the suspected parameter/field. Which of the following SQL query may successfully confirm the SQL injection vulnerability in the parameter that was detected by the automated scanner to be vulnerable?

  1. waitfor delay '0:0:5'

  2. Select * from ;--

  3. ‘ OR ‘1’=’1

  4. OR 1=1


Correct Option: A
  1. IT principles

  2. strategic business drivers

  3. business principles

  4. program or project Plans

  5. business goals


Correct Option: D
  1. complex

  2. understandable

  3. robust

  4. complete

  5. consistent


Correct Option: A

Architecture Building Blocks are architecture documentation and models from the enterprise’s

  1. Solutions Continuum

  2. Architecture Vision

  3. Architecture Continuum

  4. Architecture Board

  5. CIO


Correct Option: C
  1. SIB

  2. Architecture Capability

  3. Reference Library

  4. Service Registry


Correct Option: D
  1. Compliance

  2. Dispensation

  3. Monitoring and Reporting

  4. Budgetary Control

  5. Business Control


Correct Option: D